Filter your results
- 5
- 5
- 5
- 1
- 2
- 3
- 5
- 4
- 1
- 7
- 6
- 6
- 6
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
5 results
|
|
sorted by
|
|
Towards the Automatic Detection of Nutritional Incompatibilities Based on Recipe TitlesCD-MAKE: Cross-Domain Conference for Machine Learning and Knowledge Extraction, Aug 2017, Reggio, Italy. pp.346-366, ⟨10.1007/978-3-319-66808-6_23⟩
Conference papers
hal-01677134v1
|
||
|
JACPoL: A Simple but Expressive JSON-based Access Control Policy LanguageWISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers
hal-01802720v1
|
||
|
Filament: A Cohort Construction Service for Decentralized Collaborative Editing Platforms17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.146-16, ⟨10.1007/978-3-319-59665-5_11⟩
Conference papers
hal-01617214v1
|
||
|
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers
hal-01875521v1
|
||
|
Scalable Anti-KNN: Decentralized Computation of k-Furthest-Neighbor Graphs with HyFN17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.101-114, ⟨10.1007/978-3-319-59665-5_7⟩
Conference papers
hal-01617211v1
|